cybersecsi / houdiniLinks
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
β1,243Updated last year
Alternatives and similar repositories for houdini
Users that are interested in houdini are comparing it to the libraries listed below
Sorting:
- A repo to automatically generate and keep updated a series of Docker images through GitHub Actions.β557Updated last week
- π A curated list of awesome Docker security resourcesβ688Updated 4 months ago
- β571Updated 2 years ago
- A curated list of awesome CI CD security resourcesβ645Updated last week
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!β2,155Updated last week
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web servicesβ489Updated 2 years ago
- A Blazing fast Security Auditing tool for Kubernetesβ1,004Updated last year
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.β2,152Updated last year
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secuβ¦β1,044Updated last week
- NMAP Vulnerability Scanning Scriptsβ627Updated 3 years ago
- all paths lead to cloudsβ638Updated 2 years ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organizationβ2,005Updated 9 months ago
- Run popular commandline tools within dockerβ1,261Updated 2 years ago
- Checklist for container security - devsecops practicesβ1,593Updated 3 weeks ago
- Best practices for segmentation of the corporate network of any companyβ3,403Updated 3 months ago
- Automating situational awareness for cloud penetration tests.β2,208Updated last week
- Web Application Secure Coding Handbook resource.β348Updated 2 years ago
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assetsβ814Updated 6 months ago
- My cheatsheet notes to pentest AWS infrastructureβ691Updated 2 years ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, β¦β1,015Updated 3 months ago
- Granular, Actionable Adversary Emulation for the Cloudβ2,165Updated last week
- π¦π Awesome list of secrets in environment variables π₯οΈβ895Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,466Updated 3 years ago
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.β1,573Updated 3 years ago
- Bash script to check if a domain or list of domains can be spoofed based in DMARC recordsβ334Updated 3 years ago
- API Security Project aims to present unique attack & defense methods in API Security fieldβ1,413Updated last year
- Automated Red Team Infrastructure deployement using Dockerβ1,253Updated 3 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRsβ1,196Updated 5 months ago
- A curated list of awesome Kubernetes security resourcesβ947Updated last year
- LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requeβ¦β1,457Updated last year